Analysis of Field Data on Web Security Vulnerabilities
Title | Analysis of Field Data on Web Security Vulnerabilities |
Publication Type | Journal Article |
Year of Publication | 2014 |
Authors | Fonseca, J., Seixas, N., Vieira, M., Madeira, H. |
Journal | Dependable and Secure Computing, IEEE Transactions on |
Volume | 11 |
Pagination | 89-100 |
Date Published | March |
ISSN | 1545-5971 |
Keywords | attack injectors, Awards activities, Blogs, code inspectors, field data analysis, Internet, Internet applications, Intrusion Detection Systems, Java, languages, realistic vulnerability, review and evaluation, security, security mechanisms, security of data, security patches, Software, software fault tolerance, software faults, source code, source code (software), SQL, SQL Injection, static code analyzers, vulnerability scanners, Web application vulnerabilities, Web security vulnerabilities, XSS |
Abstract | Most web applications have critical bugs (faults) affecting their security, which makes them vulnerable to attacks by hackers and organized crime. To prevent these security problems from occurring it is of utmost importance to understand the typical software faults. This paper contributes to this body of knowledge by presenting a field study on two of the most widely spread and critical web application vulnerabilities: SQL Injection and XSS. It analyzes the source code of security patches of widely used web applications written in weak and strong typed languages. Results show that only a small subset of software fault types, affecting a restricted collection of statements, is related to security. To understand how these vulnerabilities are really exploited by hackers, this paper also presents an analysis of the source code of the scripts used to attack them. The outcomes of this study can be used to train software developers and code inspectors in the detection of such faults and are also the foundation for the research of realistic vulnerability and attack injectors that can be used to assess security mechanisms, such as intrusion detection systems, vulnerability scanners, and static code analyzers. |
URL | https://ieeexplore.ieee.org/document/6589556 |
DOI | 10.1109/TDSC.2013.37 |
Citation Key | 6589556 |
- security of data
- XSS
- Web security vulnerabilities
- Web application vulnerabilities
- vulnerability scanners
- static code analyzers
- SQL injection
- SQL
- source code (software)
- source code
- software faults
- software fault tolerance
- Software
- security patches
- attack injectors
- security mechanisms
- security
- review and evaluation
- realistic vulnerability
- languages
- Java
- Intrusion Detection Systems
- Internet applications
- internet
- field data analysis
- code inspectors
- Blogs
- Awards activities